Efficiency through biometrics

September 2015 Editor's Choice, Access Control & Identity Management, Integrated Solutions, Industrial (Industry)

As the manufacturing landscape becomes more competitive, factory owners are looking for more innovative ways of monitoring production and, more importantly, productivity per employee. Even though time and attendance is vital in these environments, productivity monitoring is even more so.

Shop-floor data collection allows factories to measure the output per employee and compare it to their own specified benchmark to make sure the manufacturing lines are running optimally. Implementing a shop-floor data collection system also allows a real-time view of jobs in progress, as well as materials needed to finish a job.

If production is down in a certain period, the systems will be able to pinpoint production figures as well as the reason for loss of production; whether it was machine breakdown, a shortage of raw material at critical periods in the production cycle, or even employees that underperformed.

While collecting shop-floor data is not a new concept in manufacturing, using biometrics to do so is. Factories implement biometrics at every work station to stop fraud, theft of production time, tools and raw material. With biometrics, the employee takes direct responsibility for the tools they book out from the tool room for specific tasks. Employees also take responsibility for the period of time they take to finish a certain task. Time and attendance systems measure the time on the work site, but no one knows what happens between the factory gates and the production lines.

Each production job that needs to be completed is loaded into the system so employees can scan the job number via a barcode reader, proximity reader, or even reading it in manually on the biometric reader before scanning their finger to identify themselves as the one doing the job.

Each work station has a biometric terminal where all the employees in this workstation can clock on their assigned jobs. The biometric terminal needs to be able to read up to four levels of job data which include the main job number, activity of the employee, the method used to do the activity and even the raw materials and tools used in this activity.

The data collected from the biometric readers is normally collected and passed to the ERP systems that will do all the calculations needed for the factory to make certain decisions on employee productivity, employee placement and even factory layout. Because more accurate data is collected, the whole production time per item, job, or process can be measured and this refines future quoting to clients.

In addition, more stringent safety laws means that factories are now opting for biometrics in order to identify employees before they use certain equipment and tools inside the workplace. This ensures that on-duty injuries are curbed, and unauthorised staff are discouraged to use certain equipment.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

AI-enabled tools reducing time to value and enhancing application security
Editor's Choice
Next-generation AI tools are adding new layers of intelligent testing, audit, security, and assurance to the application development lifecycle, reducing risk, and improving time to value while augmenting the overall security posture.

Read more...
2024 State of Security Report
Editor's Choice
Mobile IDs, MFA and sustainability emerge as top trends in HID Global’s 2024 State of Security Report, with artificial intelligence appearing in the conversation for the first time.

Read more...
Cyberthreats facing SMBs
Editor's Choice
Data and credential theft malware were the top two threats against SMBs in 2023, accounting for nearly 50% of all malware targeting this market segment. Ransomware is still the biggest threat.

Read more...
Are we our own worst enemy?
Editor's Choice
Sonja de Klerk believes the day-to-day issues we face can serve as opportunities for personal growth and empowerment, enabling us to contribute to creating a better and safer environment for ourselves and South Africa.

Read more...
How to spot a cyberattack if you are not a security pro
Editor's Choice
Cybersecurity awareness is straightforward if you know what to look for; vigilance and knowledge are our most potent weapons and the good news is that anyone can grasp the basics and spot suspicious activities.

Read more...
Protecting IP and secret data in the age of AI
Editor's Choice
The promise of artificial intelligence (AI) is a source of near-continuous hype for South Africans. However, for enterprises implementing AI solutions, there are some important considerations regarding their intellectual property (IP) and secret data.

Read more...
Super election year increases risks of political violence
Editor's Choice
Widening polarisation is expected in many elections, with terrorism, civil unrest, and environmental activism risks intensifying in a volatile geopolitical environment. Multinational businesses show an increasing interest in political violence insurance coverage in mitigation.

Read more...
Enhance control rooms with surveillance and intelligence
Leaderware Editor's Choice Surveillance Mining (Industry)
Dr Craig Donald advocates the use of intelligence and smart surveillance to assist control rooms in dealing with the challenges of the size and dispersed nature common in all mining environments.

Read more...
A long career in mining security
Technews Publishing Editor's Choice Security Services & Risk Management Mining (Industry)
Nash Lutchman recently retired from a security and law enforcement career, initially as a police officer, and for the past 16 years as a leader of risk and security operations in the mining industry.

Read more...
Future trends for electronic safety and security in mining
Fang Fences & Guards Mining (Industry) Integrated Solutions AI & Data Analytics
The mining industry is ever evolving, driven by technological advancements and the growing need for enhanced safety and security measures, with significant innovation seen in turnkey electronic security for mining operations.

Read more...